• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

you

  1. dEEpEst

    Sysinternals - Whether you’re an IT Pro or a developer, you’ll find Sysinternals utilities to help you manage

    The Sysinternals web site was created in 1996 by Mark Russinovich to host his advanced system utilities and technical information. Whether you’re an IT Pro or a developer, you’ll find Sysinternals utilities to help you manage, troubleshoot and diagnose your Windows and Linux systems and...
  2. S

    ThreatHound - tool which help you on your IR & Threat Hunting

    This tool, called "ThreatHound," is a powerful and versatile tool written in Python (with a new C version available for Linux-based systems) that helps with IR & Threat Hunting & CA. With ThreatHound, you can drop your event log file and analyze the results easily. It now supports...
  3. S

    Kali-Whoami => Privacy tool to keep you safe and anonymous

    Whoami is a user-friendly privacy and anonymity tool designed to provide a high level of security through its simple interface and easy-to-use features. The tool uses over 9 modules to ensure maximum anonymity and also comes equipped with a Bug fixer module that is currently under development to...
  4. O

    what hosts do you recommend on which you can put a warrior

    what hosts do you recommend on which you can put a warrior
  5. dEEpEst

    Everything You Need To Know About ChatGPT 

    Everything You Need To Know About ChatGPT  Who developed it? It is a variant of the GPT-3 language model, which OpenAI developed. GPT-3 is a large, powerful language model that was trained on a vast amount of text data, and ChatGPT is a variant of this model that is optimized for generating...
  6. itsMe

    C# OffensivePipeline_v2.0.0 - Allows you to download and build C# tools

    OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team exercises. Features     Currently only supports C# (.Net Framework) projects     Allows to clone public and private (you will need credentials :D) git...
  7. itsMe

    Git/Github Essentials: Everything You Need To Get Started

    Everything you need to know to get working with Git/GitHub in under 1 hour! What you’ll learn     Understand the role Git/GitHub plays in workflows that involve collaboration and version control.     Understanding of the Git/Github Framework     Learn how to create and contribute to a GitHub...
  8. itsMe

    C# Codecepticon - .NET Application That Allows You To Obfuscate C#, VBA/VB6 (Macros), And PowerShell Source Code

    Introduction Codecepticon is a .NET application that allows you to obfuscate C#, VBA/VB6 (macros), and PowerShell source code, and is developed for offensive security engagements such as Red/Purple Teams. What separates Codecepticon from other obfuscators is that it targets the source code...
  9. itsMe

    Bash Guide For Beginners: Everything You Need To Know About Bash Scripting

    Bash Guide For Beginners: Everything You Need To Know About Bash Scripting. https://www.goodreads.com/book/show/57354889-bash-guide-for-beginners Hidden content
  10. itsMe

    Aleph v3.12.7 RC1 - find the people and companies you look for

    Aleph is a tool for indexing large amounts of both documents (PDF, Word, HTML) and structured (CSV, XLS, SQL) data for easy browsing and search. It is built with investigative reporting as a primary use case. Aleph allows cross-referencing mentions of well-known entities (such as people and...
  11. itsMe

    Reverse Engineering Riptide - A powerful tool allowing you to reverse .EXE back to .PY

    Riptide is a tool allowing you to reverse .EXE files compiled with PyInstaller back to the original source, Python, showing you the source code of the file. Hidden content
  12. itsMe

    Phyton FindWall - Check if your provider is blocking you

    What does it do? FindWall is Python script that allows to understand if your network provider is limiting your access to the Internet by blocking any TCP/UDP port. In order to perform this check FindWall needs to connect a public VPS of your property. FindWall performs the following actions...
  13. itsMe

    CVE-Tracker - With The Help Of This Automated Script, You Will Never Lose Track Of Recently Released CVEs

    With the help of this automated script, you will never lose track of newly released CVEs. What does this powershell script do is exactly running the Microsoft Edge at system startup, navigate to 2 URLs ,and then put the browser in to full screen mode. As ethical hackers, it's vital that we keep...
  14. itsMe

    Phyton Email-Prediction-Asterisks - Script That Allows You To Identify The Emails Hidden Behind Asterisks

    Email prediction asterisks is a script that allows you to identify the emails hidden behind asterisks. It is a perfect application for osint analysts and security forces. It allows to intelligently predict, using Intelx leaks, which emails are related to the person we are looking for. It also...
  15. itsMe

    Penetration Testing with KALI and More: All You Need to Know Course

    Ethical Hacking with KALI LINUX What you’ll learn Penetration Testing with KALI and More: All You Need to Know Course     Learn simplified ethical hacking techniques from scratch     Linux basics     Learn more than 9 ways to perform LAN attacks     Master 2 smart techniques to crack into...
  16. itsMe

    Phyton Complete Python 3.10 Course : You to Python Wizard in 2022

    Description Welcome to this python programming course for beginners where you’ll become a Python Wizard! (python wizard is someone who can handle any problem like a boss and use the keyboard like a piano~ ) After completing this course you will be able to easily handle any programming project...
  17. itsMe

    What is the Dark Web and Should You Use it?

    Millions of tech-lovers around the world are aware that multiple dimensions exist on the World Wide Web. The internet, to call it by its household name, does not solely consist of what we interact with, far from it. In fact, what we interact with and search for overall only makes up a few...
  18. dEEpEst

    Should you pay the ransom ?

    Should you pay the ransom ? Most law enforcement agencies recommend not paying ransomware attackers, citing that it will only invite hackers to commit more ransomware attacks. However, when an organization faces a possibility of weeks or longer of recovery, the thought of lost profits may begin...
  19. dEEpEst

    How do you prevent ransomware attacks ?

    How do you prevent ransomware attacks ? To protect against ransomware threats and other types of cyberextortion, security experts urge users to do the following: - Back up computing devices regularly. - Inventory all assets. - Update software, including antivirus software. - Have end users...
  20. dEEpEst

    How do you create a strong password ?

     How do you create a strong password ? Password crackers can decipher passwords in a matter of days or hours, depending on how weak or strong the password is. To make a password stronger and more difficult to uncover, a plaintext password should adhere to the following rules: - Be at least 12...
Back
Top